GET /api/techniques/376/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"id": 376,
"key": "appinit-dll-injection",
"unprotect_id": "U1244, T1546",
"name": "AppInit DLL Injection",
"description": "Any **Dynamic Link Libraries (DLL)** that are specified within the `AppInit_DLLs` registry key values are loaded by user32.dll into any process that utilizes user32.dll. So by modifying the `AppInit_DLLs` registry key value and pointing it to a malicious DLL, an attacker can force the system to load their DLL into every process that utilizes user32.dll and force it to execute their code.",
"windows": "",
"linux": "",
"macos": "",
"resources": "https://attack.mitre.org/techniques/T1546/010/",
"creation_date": "2024-08-17T16:05:00.052918Z",
"tags": "",
"modification_date": "2024-08-17T16:08:18.408557Z",
"category": [
4,
10
],
"rules": [],
"attachments": [],
"featured_api": [
313,
321
],
"contributors": [
41
]
}